VYPR
Medium severity6.5NVD Advisory· Published Aug 28, 2025· Updated Apr 23, 2026

CVE-2025-48347

CVE-2025-48347

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vincent Mimoun-Prat bxSlider integration for WordPress bxslider-integration allows Stored XSS.This issue affects bxSlider integration for WordPress: from n/a through <= 1.7.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in bxSlider integration for WordPress ≤1.7.2 lets attackers inject malicious scripts executed when visitors view the site.

Vulnerability

Overview The bxSlider integration for WordPress plugin versions up to 1.7.2 contain a stored cross-site scripting (XSS) vulnerability. This flaw arises from improper neutralization of user-supplied input during web page generation, allowing an authenticated attacker with sufficient permissions to inject arbitrary HTML and JavaScript code that gets stored on the server. [1]

Exploitation

Requirements To exploit this vulnerability, an attacker must have a WordPress user role that permits posting or editing content where the bxSlider shortcode or settings are used. The attack does not require the victim to be tricked into clicking a link; once stored, the malicious script executes automatically for any visitor viewing the affected page. [1]

Impact

Successful exploitation enables an attacker to execute arbitrary scripts in the context of the victim's browser. This can be used to steal session cookies, redirect users to malicious sites, display unauthorized advertisements, or deface the website. The stored nature of the XSS means the payload persists and affects all subsequent visitors. [1]

Mitigation

The vulnerability has been addressed by the vendor in a patched version. Users should update the bxSlider integration plugin to the latest available version. For those unable to update immediately, it is recommended to restrict editing privileges to trusted users and consider using a web application firewall (WAF) to filter malicious input. [1]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.